Surviving E-Discovery: Five Strategies for Information Security

Information Security professionals are increasingly asked to play critical roles in responding to legal requests for electronic records and information. Learn five key strategies for being prepared to perform your role--and survive the maelstroms of the e-discovery storms.

Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.

Dynamic, volatile, innovative. Cloud security is all of these and more. Join this webinar to learn more about:
- How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty?
- How can customers gain trust in their service vendors despite the parade?

Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.

New threats and new defenses constantly challenge the rules for managing security across third party cloud services. In this webcast, you will learn 7 strategies for how to structure and adapt the complex commercial agreements to assure both vendors and customers new risks are being controlled.

Security demands countless decisions to determine whether or not log data or other surveillance data are positive indicators of adverse activity or merely false positives. Knowing when, and how, to make and document those decisions can be critical to how legal and compliance sanctions may be imposed. Designing your security controls to do so effectively can make all of the difference. Learn how rules-based design can transform your design frameworks and keep lawyers and regulators away.

Security, information governance, and public regulation all share a core value--creating digital information that can be trusted as the truth. But an effective economic business case has eluded security advocates. Making that case succeed requires a new way of counting the value of effective security and measuring the trust that can be achieved.

You know that every decision to use the Cloud will be challenged, whether by investors, executives, customers, or members of your own team. Behind every challenge is the same question, "Can we trust the decision?" This presentation introduces a new decision model that will transform the confidence you can earn from others that your decisions are to be trusted.

The dirty secret in contracting for cloud-based services is that the commercial contract between the client and provider can be a weak link in the overall enterprise security program. Recent headlines illustrate that the contract can be invaluable . . . or worthless . . . when an adverse security event occurs.

How can security professionals be more successful in mitigating the risks contracts and SLAs can bring? How do practitioners go about building an effective collaboration with business, IT, and legal professionals within the organization? The contract needs to be a tool for truly managing the cloud services, and not just a weapon for the lawyers if things go bad.

Join (ISC)2, Capella University andThe Ritter Academy for our ThinkTank Roundtable on July 7, 2011 at 12:00pm Noon Eastern time for an examination of these issues and a discussion on how to best handle contracts and SLAs.

E-Discovery is creating enormous new forces upon limited corporate resources, yet vendors, law firms and consultants continue to resist delivering functional, responsive solutions to the real problems inside companies. This provocative keynote reveals 10 critical truths regarding the current market, and how companies must respond in order to truly gain control of their organizations and their information.

Unified communications challenge companies to navigate an increasing portfolio of laws governing content, monitoring and interception of communications and accessing stored records. Courts are also challenging the use of effective security on new UC solutions. Learn more in this valuable webcast.

Security professionals are squarely on the firing line as courts increasingly demand that digital evidence--including e-mail--be authentic and reliable in order to be admitted into the court. THIS PROGRAM HAS BEEN RESCHEDULED FROM FEBRUARY 10 DUE TO PERSONAL ILLNESS.

Echelon One CEO Bob West interviews Jeffrey Ritter, Esq., the author of a new book on the critical e-discovery questions, and uncovers the critical defensive strategies to be employed.

Until now, no tools have emerged that allow lawyers, IT professionals, records managers and e-discovery specialists to literally see their challenges--and plan their success! THIS BROADCAST IS BEING RESCHEDULED TO FEB. 20 DUE TO PERSONAL ILLNESS

This webcast introduces the CastleQuest Discovery Maps and how they are being used to transform the strategies and battle plans of today's e-discovery challenges.

Learn from Jeffrey Ritter, the creator of the CastleQuest Discovery Library, 10 winning strategies for how the CastleQuest Maps can deliver the path forward.

Understanding the critical business impacts of e-discovery is vital -- this program enables information security professionals to learn how to show new value for their programs and reduce e-discovery risks.

Information Security professionals are increasingly asked to play critical roles in responding to legal requests for electronic records and information. Learn five key strategies for being prepared to perform your role--and survive the maelstroms of the e-discovery storms.

These webcasts deliver you innovative tools and strategies for enriching the trust in your digital assets. Systems, devices, applications, and data--all must be trusted to make good decisions in business. Here you learn the tools for doing so and how to adapt them to the specific objectives of your responsibilities.